Collections in this community

Recent Submissions

  • Determining disease outbreak influence from voluminous epidemiology data on enhanced distributed graph-parallel system 

    Contributor:Shah, Naman;
    Date Submitted:2017
    Historically, catastrophe has resulted from large-scale epidemiological outbreaks in livestock populations. Efforts to prepare for these inevitable disasters are critical, and these efforts primarily involve the efficient ...
  • Low-latency, query-driven analytics over voluminous multidimensional, spatiotemporal datasets 

    Contributor:Malensek, Matthew;
    Date Submitted:2017
    Ubiquitous data collection from sources such as remote sensing equipment, networked observational devices, location-based services, and sales tracking has led to the accumulation of voluminous datasets; IDC projects that ...
  • Sparse Bayesian reinforcement learning 

    Contributor:Lee, Minwoo;
    Date Submitted:2017
    This dissertation presents knowledge acquisition and retention methods for efficient and robust learning. We propose a framework for learning and memorizing, and we examine how we can use the memory for efficient machine ...
  • A parametric classification of directed acyclic graphs 

    Contributor:Chaturvedi, Mmanu;
    Date Submitted:2017
    We consider four NP-hard optimization problems on directed acyclic graphs (DAGs), namely, max clique, min coloring, max independent set and min clique cover. It is well-known that these four problems can be solved in ...
  • A hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules 

    Contributor:Bennett, Phillipa;
    Date Submitted:2017
    Many of today's computing systems must show evidence of conformance to rules. The rules may come from business protocol choices or from multi-jurisdictional sources. Some examples are the rules that come from the regulations ...
  • A multi-level code comprehension model for large scale software 

    Contributor:Vans, A. Marie;
    Date Submitted:1996
    For the past 20 years researchers have studied how programmers understand code they did not write. Most of this research has concentrated on small-scale code understanding. We consider it necessary to design studies that ...
  • A locality-aware scientific workflow engine for fast-evolving spatiotemporal sensor data 

    Contributor:Kachikaran Arulswamy, Johnson Charles;
    Date Submitted:2017
    Discerning knowledge from voluminous data involves a series of data manipulation steps. Scientists typically compose and execute workflows for these steps using scientific workflow management systems (SWfMSs). SWfMSs have ...
  • Detecting advanced botnets in enterprise networks 

    Contributor:Zhang, Han;
    Date Submitted:2017
    A botnet is a network composed of compromised computers that are controlled by a botmaster through command and control (C&C) channel. Botnets are more destructive compared to common virus and malware, because they control ...
  • Searching over encrypted data 

    Contributor:Moataz, Tarik;
    Date Submitted:2017
    Cloud services offer reduced costs, elasticity and a promised unlimited managed storage space that attract many end-users. File sharing, collaborative platforms, email platforms, back-up servers and file storage are some ...
  • Preservation of low latency service request processing in dockerized microservice architectures 

    Contributor:Sudalaikkan, Leo Vigneshwaran;
    Date Submitted:2016
    Organizations are increasingly transitioning from monolithic architectures to microservices based architectures. Software built as microservices can be broken into multiple components that are easily deployable and scalable ...
  • Horizontal scaling of video conferencing applications in virtualized environments 

    Contributor:Luo, Mante;
    Date Submitted:2016
    Video conferencing is one of the most widely used services in the world. However, it usually requires dedicated hardware and expensive licenses. Cloud computing has helped many companies achieve lower operation costs, and ...
  • Identification and characterization of super-spreaders from voluminous epidemiology data 

    Contributor:Shah, Harshil;
    Date Submitted:2016
    Planning for large-scale epidemiological outbreaks often involves executing compute-intensive disease spread simulations. To capture the probabilities of various outcomes, these simulations are executed several times over ...
  • Detection of linear algebra operations in polyhedral programs 

    Contributor:Iooss, Guillaume;
    Date Submitted:2016
    Writing a code which uses an architecture at its full capability has become an increasingly difficult problem over the last years. For some key operations, a dedicated accelerator or a finely tuned implementation exists ...
  • Towards a secure and efficient search over encrypted cloud data 

    Contributor:Strizhov, Mikhail;
    Date Submitted:2016
    Cloud computing enables new types of services where the computational and network resources are available online through the Internet. One of the most popular services of cloud computing is data outsourcing. For reasons ...
  • Error correcting Optical Mapping data 

    Contributor:Washimkar, Darshan;
    Date Submitted:2016
    Optical Mapping is a unique system that is capable of producing high-resolution, high-throughput genomic map data that gives information about the structure of a genome (Schwartz et al., Science 1993). Recently it has been ...
  • Towards automatic compilation for energy efficient iterative stencil computations 

    Contributor:Zou, Yun;
    Date Submitted:2016
    Today, energy has become a critical concern in all aspects of computing. In this thesis, we address the energy efficiency of an important class of programs called "Stencil Computations", which occur frequently in a wide ...
  • Quantifying the security risk of discovering and exploiting software vulnerabilities 

    Contributor:Mussa, Awad A. Younis;
    Date Submitted:2016
    Most of the attacks on computer systems and networks are enabled by vulnerabilities in a software. Assessing the security risk associated with those vulnerabilities is important. Risk mod- els such as the Common Vulnerability ...
  • Large-scale automated protein function prediction 

    Contributor:Kahanda, Indika;
    Date Submitted:2016
    Proteins are the workhorses of life, and identifying their functions is a very important biological problem. The function of a protein can be loosely defined as everything it performs or happens to it. The Gene Ontology ...
  • Quantitative economics of security : software vulnerabilities and data breaches 

    Contributor:Algarni, Abdullah Mahdi;
    Date Submitted:2016
    Security vulnerabilities can represent enormous risks to society and business organizations. A large percentage of vulnerabilities in software are discovered by individuals external to the developing organization. These ...
  • On approximating transitivity and tractability of graphs 

    Contributor:Manchanda, Saksham;
    Date Submitted:2016
    In the general case, in a simple, undirected graph, the problems of finding the largest clique, minimum colouring, maximum independent set and minimum vertex cover are NP-hard. But, there exists some families of graphs, ...

View more